Author of the publication

Recovering High-Value Secrets with SGX and Social Authentication.

, , and . WAY@SOUPS, USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recovering High-Value Secrets with SGX and Social Authentication., , and . WAY@SOUPS, USENIX Association, (2016)SoK: A Framework for Unifying At-Risk User Research., , , , , , , , , and . CoRR, (2021)Quantifying Users' Beliefs about Software Updates., , , , and . CoRR, (2018)Effects of Privacy Permissions on User Choices in Voice Assistant App Stores., and . Proc. Priv. Enhancing Technol., 2022 (4): 421-439 (2022)An Experience Sampling Study of User Reactions to Browser Warnings in the Field., , , , , and . CHI, page 512. ACM, (2018)Keepers of the Machines: Examining How System Administrators Manage Software Updates For Multiple Machines., , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Can Humans Detect Malicious Always-Listening Assistants? A Framework for Crowdsourcing Test Drives., , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-28 (2022)Runtime Permissions for Privacy in Proactive Intelligent Assistants., , and . SOUPS @ USENIX Security Symposium, page 633-651. USENIX Association, (2022)Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging., , , , and . SP, page 274-292. IEEE, (2023)Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants., , , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 3 (4): 153:1-153:23 (2019)